• Title/Summary/Keyword: message

Search Result 4,953, Processing Time 0.027 seconds

Remote Procedure Call Scheme to Support Fault-Tolerance (결함 허용을 제공하는 원격 프로시듀어 호출 기법)

  • Han, Suk-Jin;Koo, Yong-Wan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.4
    • /
    • pp.453-465
    • /
    • 1995
  • RPC(Remote Procedure Call) has been studied for programmer to easily write distributed program of little bit higher efficiency and reliability. In this study, fault-tolerant remote procedure call for hardware failures is proposed. Fault-tolerance is supplied by replicated procedures with node group, so called chain, and copies along chains are linearly ordered. Calls for procedure are sent to primary copy along chains, and other copies are propagated internally. If failures happen, first copy in faultless chain returns the result to the caller, Especially, in this study processing of redundant call message and result message, while using limited ack message, are avoided. This method supplies efficient and reliable fault-tolerance compared with existing remote procedure call.

  • PDF

Advanced Message Storing Method on mobilePOST SMSC (mobilePOST SMSC(Short Message Service Center)에서의 향상된 메시지 저장 기법)

  • Song, Byung-Kwen
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.2
    • /
    • pp.126-138
    • /
    • 2008
  • This paper proposes the preservation method that can effectively process short messages at mobilePOST SMSC(Short Message Service Center) platform on CDMA(Code Division Multiple Access). There are three techniques for the preservation method. First one is shared memory technique where several processes within the system share same memory to process transmission of short messages with maximum performance. Second one is to back-up messages in shared memory to the file system to prevent lost during system initialization or other unstable period. Third technique is that when transmission of short message was completed, finished message is moved from the shared memory to relational database for accounting purposes.

The Effects of Cause-Marketing Messages Delivered on Restaurant Menu (외식기업의 공익연계 메시지의 효과연구)

  • Kim, Byoung Seok;Hwang, Johye
    • Knowledge Management Research
    • /
    • v.15 no.4
    • /
    • pp.127-145
    • /
    • 2014
  • This study aims to examine the effects of message framing of restaurant menus on customers' perceptions (trust and immersion) and their willingness to pay a premium price. The contents of messages focused on a hypothetical restaurant's cause-marketing activity. Four types of message framing were created: The first two types were varied by the presence and absence of the information about the current cause-marketing outcome, and the second two types were varied by positive and negative framing. The results showed that respondents in general had trust in cause-marketing messages and immersion of cause-marketing message by negative framing lead to positive influence of willingness to pay. Furthermore it had a significant effect on willingness to pay depending on cause-marketing message type and negative message framed messages showed an intention to willingness to pay a premium price. This study compared the difference in messages by type as an extension of the studies of cause-marketing messages in the past. The results of this study will be used for establishing effective marketing strategies for today's foodservice companies and serve as objective data for setting differentiated prices under the circumstance where the importance of companies' social responsibilities is growing.

Spam Message Filtering with Bayesian Approach for Internet Communities (베이지안을 이용한 인터넷 커뮤니티 상의 유해 메시지 차단 기법)

  • Kim, Bum-Bae;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.733-740
    • /
    • 2006
  • Spam Message has been Causing widespread damages on the Internet. One source of the problems is rooted from an anonymously posted message in the bulletin board in Internet communities. This type of the Spam messages tries to advertise products, to harm other's reputation, to deliver religious messages and so on. In this paper we present the Spam message filtering using the Bayesian approach. In order to increase usefulness of the Spam filter in the bulletin board in Internet communities, we made the Spam filter which can divide the Spam message into six categories such as advertisement, pornography, abuse, religion and other. The test conducted against messages posted on the popular web sites.

Design and evaluation of an alert message dissemination algorithm using fuzzy logic for VANETs

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.4
    • /
    • pp.783-793
    • /
    • 2010
  • Several multi-hop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or propagate useful traffic information to other vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem, a scenario in which there is a high level of contention and collisions at the link layer due to an excessive number of broadcast packets. We present a fuzzy alert message dissemination algorithm to improve performance for road safety alert application in Vehicular Ad-hoc Network (VANET). In the proposed algorithm, when a vehicle receives an alert message for the first time, the vehicle rebroadcasts the alert message according to the fuzzy control rules for rebroadcast degree, where the rebroadcast degree depends on the current traffic density of the road and the distance between source vehicle and destination vehicle. Also, the proposed algorithm is the hybrid algorithm that uses broadcast protocol together with token protocol according to traffic density. The performance of the proposed algorithm is evaluated through simulation and compared with that of other alert message dissemination algorithms.

A Solution of Binary Jamming Message to Source-Wiretapping and Disadvantage of Sharing the Jamming Signal in Physical-Layer Security (물리 계층에서 보안 재밍 신호 공유의 한계점과 이진 재밍 메시지 도청의 해결책)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.63-67
    • /
    • 2014
  • A distributed zero-beamforming based cooperative jamming technique is useless when an eavesdropper detects the sharing seed. In addition, the currently alternatives are very limited when the eavesdropper is located nearby a source for wiretapping. This letter presents a solution to this extreme case. Relay randomly generates and transmits a binary jamming message to both source and destination in the first phase. When these two receivers securely and correctly decode the message, the source creates and transmits another message based on the use of exclusive-or for its information message and the decoded message. Consequently, the next transmission can avoid the eavesdropping.

An Approach to Application of Component Based on Message Central Processing change the C2 Architecture (C2 아키텍처를 변형한 메시지 중앙처리 기반의 Component 활용 기법)

  • 정화영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.1089-1094
    • /
    • 2003
  • Recently, Software development method supported CBD is applied with many concern and is researched with part of application and composition based-on architecture effectively use it. Effectively, C2 architecture has been concern with the point of component composition method based-on message driven for supported GUI. But, In case of classified sequence in component and method call method in server component, component must be modified to apply it. Thus, In this paper, Message handling part with a part of C2 architecture change is locate in the message neither component not connector. So, Although method call method it can be composit and operate component for support Plug-and-Play without modification. Also, it's possible the more flexible message handling with parallel composition of component between message without classified sequence.

Message Complexity Analysis of MANET Address Autoconfiguration-Single Node Joining Case (단일 노드 결합시 MANET 자동 네트워킹 프로토콜의 메시지 복잡도 분석)

  • Kim, Sang-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5B
    • /
    • pp.257-269
    • /
    • 2007
  • This paper proposes a novel method to perform a quantitative analysis of message complexity and applies this method in comparing the message complexity among the mobile ad hoc network (MANET) address autoconfiguration protocols (AAPs). To obtain the upper bound of the message complexity of the protocols, the O-notation of a MANET group of N nodes has been applied. The message complexity of the single node joining case in Strong DAD, Weak DAD with proactive routing protocols (WDP), Weak DAD with on-demand routing protocols (WDO), and MANETconf has been derived as n(mO(N)+O(t)), n(O(N)+O(t)), n(O(N)+2O(t)), and nO((t+1)N)+O(N)+O(2) respectively. In order to verify the bounds, analytical simulations that quantify the message complexity of the address autoconfiguration process based on the different coflict probabilities are conducted.

Improvement Method for Message Processing Speed of ADC2A System (방공지휘통제경보체계 메시지처리속도 향상 방안)

  • Lee, Jeong-min;Lim, Won-gi;Park, Seung-jin;Choi, June-sung
    • Journal of IKEEE
    • /
    • v.19 no.3
    • /
    • pp.349-356
    • /
    • 2015
  • Air Defense Command Control and Alert(ADC2A) system is a system that ensures simultaneity and integrity of air defense operations by combining sensors, weapons and Command and Control(C2) systems over a tactical network to protect forces, facilities and strategic points from enemy's air attack. Improving message processing speed is a very important factor for ADC2A, because it uses high frequency bit-processing of the Army standard KVMF message to communicate with internal and external systems. In this paper we proposed improved method of KVMF message processing for ADC2A system.

Smart Message Service Platform for Mobile Environment (모바일용 스마트 메시지 서비스 플랫폼)

  • Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.73-79
    • /
    • 2011
  • With increasing use of smartphone, users require a new message service to prevent security attack and provide integrated messages. Since smartphone uses data services such as 3G cell network and WiFi, it can provide reliable message transfer through various security policies. In addition, it can transfer various data collected using built-in camera and GPS. This paper proposes a smart message service platform which can provide security services such as authentication, confidentiality and integrity as well as transfer the integrated message including location, picture and text. To verity the functionality of the platform, this paper implements an iPhone app and message transfer server, and then shows the implementation results.